CRYPTREC (redirect from Cryptography Research and Evaluation Committees)
CRYPTREC is the Cryptography Research and Evaluation Committees set up by the Japanese Government to evaluate and recommend cryptographic techniques for...
8 KB (974 words) - 00:22, 19 August 2023
KCipher-2 (category Cryptography stubs)
published by the Japanese Cryptography Research and Evaluation Committees (CRYPTREC). It has a key length of 128 bits, and can encrypt and decrypt around seven...
2 KB (156 words) - 14:44, 9 April 2024
implementation of cryptographic work regulations, is responsible for managing cryptography research, production, sales, evaluation, and application, plans and manages...
4 KB (220 words) - 19:43, 16 March 2025
progress in the research on quantum computing, necessitating a re-evaluation of our cryptographic strategy." NSA advised: "For those partners and vendors that...
9 KB (929 words) - 15:23, 23 December 2024
Shai Halevi (section Research)
computer scientist who works on cryptography research at Amazon Web Services. Born in Israel in 1966, Halevi received a B.A. and M.Sc. in computer science from...
9 KB (786 words) - 21:07, 6 February 2025
systems security. This issue was eventually addressed by combining cryptography and system security discussions in the same sessions. In 2011, the conference...
15 KB (1,707 words) - 21:24, 4 December 2024
Anne Canteaut (section Cryptographic primitives)
Anne Canteaut is a French researcher in cryptography, working at the French Institute for Research in Computer Science and Automation (INRIA) in Paris...
6 KB (483 words) - 00:23, 19 February 2025
Dorothy E. Denning (category Computer systems researchers)
associate professor at Purdue (1981-1983), she wrote her first book, Cryptography and Data Security in 1982. She joined SRI International as computer scientist...
20 KB (2,203 words) - 00:43, 18 March 2025
Oded Goldreich (category International Association for Cryptologic Research fellows)
pseudorandomness, zero knowledge proofs, secure function evaluation, property testing, and other areas in cryptography and computational complexity. Goldreich has also...
15 KB (1,378 words) - 09:52, 15 March 2025
advocates the widespread use of strong cryptography and privacy-enhancing technologies as a means of effecting social and political change. The cypherpunk movement...
53 KB (5,592 words) - 01:11, 25 April 2025
began sending technical assistance to upgrade their communications and cryptography capabilities. One part was to send them modified Enigma machines to...
37 KB (5,378 words) - 22:26, 23 December 2024
interpretations. Some national evaluation schemes are phasing out EAL-based evaluations and only accept products for evaluation that claim strict conformance...
30 KB (3,769 words) - 00:01, 9 April 2025
implementation and evaluation of research and development programs Provide technical support and analysis to the President’s Council of Advisors on Science and Technology...
31 KB (3,599 words) - 21:49, 23 November 2024
Claude Shannon (category Members of the Royal Netherlands Academy of Arts and Sciences)
ISBN 978-0691151007 Everett M. Rogers, Claude Shannon's Cryptography Research During World War II and the Mathematical Theory of Communication, 1994 Proceedings...
83 KB (8,363 words) - 18:00, 10 May 2025
Data Encryption Standard (redirect from DES (cryptography))
has been highly influential in the advancement of cryptography. Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the...
60 KB (6,714 words) - 15:08, 11 April 2025
Computer science (redirect from Systems and Computing Engineering)
abstract models of computation and general classes of problems that can be solved using them. The fields of cryptography and computer security involve studying...
72 KB (6,673 words) - 05:26, 18 April 2025
IPsec (category Cryptographic protocols)
authentication between agents at the beginning of a session and negotiation of cryptographic keys to use during the session. IPsec can protect data flows...
44 KB (5,337 words) - 23:10, 17 April 2025
Streebog (category Cryptographic hash functions)
Russian Technical Committee for Standardization "Cryptography and Security Mechanisms" (TC 26) with the participation of Academy of Cryptography of the Russian...
8 KB (854 words) - 17:38, 7 January 2025
National Cyber Security Hall of Fame (category Science and technology halls of fame)
cryptography system with Diffie and Hellman Whitfield Diffie – developed the world's earliest public key cryptographic system along with Merkle and Hellman...
11 KB (1,093 words) - 03:01, 11 April 2025
Warren Weaver (category American operations researchers)
electronic calculating machines and the successful application of mathematical and statistical techniques in cryptography. He has served as a member of...
18 KB (2,082 words) - 07:01, 30 January 2025
Haskell (section Conferences and workshops)
functional programming language with type inference and lazy evaluation. Designed for teaching, research, and industrial applications, Haskell pioneered several...
50 KB (4,584 words) - 21:59, 17 March 2025
Crypto Wars (category History of cryptography)
made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption...
37 KB (4,098 words) - 16:28, 10 May 2025
General der Nachrichtenaufklärung (category Cryptography organizations)
do with the chi-squared test, a common cryptographic test used as part of deciphering of enciphered message, and invented by Solomon Kullback, but simply...
288 KB (39,359 words) - 08:27, 10 May 2025
quantum computing and neuroscience. IARPA is a major funder of quantum computing research, due to its applications in quantum cryptography. As of 2009, IARPA...
30 KB (2,542 words) - 10:58, 9 March 2025
Organization Department of the Chinese Communist Party (redirect from Organization Department of the CPC Central Committee)
effective evaluation procedure is not yet in place. Crucial policy areas, such as environmental issues, are not being evaluated, and evaluation is predominantly...
18 KB (1,696 words) - 11:24, 26 April 2025
networking. The research activities of the Centre are on cryptography, network security, internet access over the power line medium and many others. In...
25 KB (3,009 words) - 17:52, 2 May 2025
INDECT (category Research projects)
information using quantum cryptography and new methods of digital watermarking Performing computer-aided detection of threats and targeted crimes in Internet...
11 KB (908 words) - 20:07, 31 January 2025
Cipher Department of the High Command of the Wehrmacht (category Cryptography organizations)
do with the chi-squared test, a common cryptographic test used as part of deciphering of enciphered message, and invented by Solomon Kullback, but simply...
132 KB (15,440 words) - 22:35, 17 November 2024
rigor of security evaluations. Part 4: Framework for the specification of evaluation methods and activities – Details the methodology and framework for conducting...
33 KB (3,524 words) - 11:40, 11 May 2025
Elie Bursztein (section Education and early career)
where he collaborated with Dan Boneh and John Mitchell on web security, game security, and applied cryptographic research. His work at Stanford University...
28 KB (1,926 words) - 20:35, 15 January 2025